fingerprintjs / external-protocol-flooding

Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
https://schemeflood.com
MIT License
644 stars 47 forks source link

Not working? #7

Closed MaxMatti closed 3 years ago

MaxMatti commented 3 years ago

I get three different Fingerprints for Firefox, Chromium and Tor Browser (all three with supposedly vulnerable versions according to your README file). All three manage to miscalculate the apps that are installed. Firefox reports almost every app as installed (although I don't have all the reported ones) while the other two browsers report fewer apps installed than what's present on my pc. Running Archlinux with a few typical privacy-preserving Add-Ons on Firefox and an Adblocker on Chromium.

I can send you more exact information about my setup if you're interested, but I don't want to post that publicly.

I would be interested to see what part of my setup "breaks" the detection.

spalt08 commented 3 years ago

Hi Max, Thanks for the feedback.

Feel free to contact me on konstantin.darutkin@fingerprintjs.com

Will mark it as duplicate of #5